This accessible book examines the physical security of computer hardware, networks, and digital data, introduces different forms of rogue software, discusses methods for prevention and defense, and describes a selection of viruses, worms and Trojans in detail.
Cyberspace is now an integral part of the world’s economy, making its safety and security vital. This book is a survey and catalog of the multitude of emerging organizations promoting global initiatives to secure cyberspace.
This book defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The book includes chapters by world renowned experts in this field.
Covering every angle of the subject, this is a cutting-edge text presenting IT and non-IT facets of insider threats together. The volume gathers a critical mass of well-established worldwide researchers, and provides a unique multidisciplinary overview.
This carefully written book is an edited volume by world class leaders within computer network and information security presented in an easy-to-follow style. It introduces defense alert systems against computer and network attacks, and covers much more.
IT Security Management provides an insight on how to create and stimulate a team of passionate IT security professionals, so called “securiteers”. Their added value to the business is to improve the information security position of organisations.
In cyber-based systems, tasks can be formulated as learning problems and approached as machine-learning algorithms. This book covers applications of machine-learning methods in reliability, security, performance and privacy issues in cyber space.
This book explores the economic, behavioral and legal factors that drive information security risks and solutions. It contains contributions from many leading researchers in the field and is ideal for managers and policy makers.